A REVIEW ON DIGITAL SIGANTURE SCHEMES

Authors

  • Shyma Kareem Assistant Professor, Department of Computer Applications, Musaliar College of Engineering and Technology, Pathanamthitta

Keywords:

Digital Signature, RSADSS, EDSS, SDSS, NISTDSS, ECDSS

Abstract

The most significant progress from the effort on public key cryptography is the digital signature. A digital signature is a scientific scheme for verifying the authenticity of digital messages or documents. It provides message authentication and data integrity. This paper is a survey on existing digital signature schemes used for authentication. The purpose of this review is to bring the idea of digital signature technique for researchers.

References

I. F.Li& M.,Khurram Khan ,“A biometric identity based Encryption scheme” Elsevier Future Generation Computer Systems 2010.

II. DraganVidakovic, DuskoParezanovic, OliveraNikolic and JelenaKaljevic, “RSA Signature: Behind the Scenes” Advanced Computing: An International Journal ( ACIJ ), Vol.4, No.2, March 2013.

III. D.Vidakovic, O. Nikolic, D. Parezanovic, “Acceleration Detection of Large (Probably) Prime Numbers”, International Journal of UbiComp (IJU), Vol.4, No.1, January 2013.

IV. Hung-Zih Liao and Yuan-Yuan Shen ,“On the Elliptic Curve Digital Signature Algorithm” Tunghai Science Vol. 8,pp.109−126 , July 2006.

V. MihirBellare and Phillip Rogaway , “The Exact Security of Digital Signatures- How to Sign with RSA and Rabin” U. Maurer (Ed.): Advances in Cryptology - EUROCRYPT ’96, LNCS 1070, pp. 399-416, 1996. Springer-Verlag Berlin Heidelberg 1996.

VI. Shivendra Singh Md. SarfarazIqbal and ArunimaJaiswal ,“Survey on Techniques Developed using Digital Signature: Public key Cryptography”, International Journal of Computer Applications (0975 – 8887) Vol. 117 , No. 16, May 2015.

VII. Felten EW, Balfanz D, Dean D, Wallach DS. ,”Web spoofing: an internet con game”, Software World. 1997; 28(2):6-8.

VIII. Payal Saha.”A comprehensive study on Digital Signature for internet security”. ACCENTS Transactions on Information Security , May 2016.

IX. L., Buttyán, L.,Dóra, F.,Martinelli, M.,Petrocchi. “Fast certificate-based authentication scheme in multioperator maintained wireless mesh networks” Elsevier Computer Communications. May 2010.

X. M. Bishop, Introduction to Computer Security, Reading, MA:Addison-Wesley, 2005.

XI. W. Stallings, Cryptography and Network Security, NJ:Prentice-Hall, 2015.

Additional Files

Published

15-09-2023

How to Cite

Shyma Kareem. (2023). A REVIEW ON DIGITAL SIGANTURE SCHEMES. International Education and Research Journal (IERJ), 9(9). Retrieved from https://ierj.in/journal/index.php/ierj/article/view/3079